Using computer systems to launch a terrorist attack is an example of which of the following?
A) Computer-based espionage
B) Information warfare
C) Cyber terrorism
D) Hacktivism
C) Cyber terrorism
Computer Science & Information Technology
You might also like to view...
If you use someone else's work without permission or credit and pass it off as your own work, you are ________ the work
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which option allows you to rotate text by 90 degrees?
A) Align Text B) Text Direction C) Text Rotate D) Text Diagonal
Computer Science & Information Technology